BrickLogix in partnership with IBM offers
organizations the service of security vulnerability assessment
and protective solutions. Team of qualified security professionals
analyze organization's operations, procedures, data, communications
and software systems to determine what security measures may be
necessary to protect against exposure to vulnerabilities and to
conform to the many security regulations that must now be complied
with to govern the handling, storage, and manipulation of web
servers, email servers, e-commerce applications, laptops, private
and public data.
BrickLogix's preemptive approach to your security can
help you -
. Stop Internet threats before they damage your brand reputation
and customer confidence
. Safeguard your privacy and prevent loss of confidential data
. Improve business uptime and employee productivity
. Address security & confidentiality initiatives for compliance
audits - PCI, GLBA, SOX, HIPPA
. Manage constant change and meet the demand to stay competitive
Our security services are backed by IBM's X-Force security
intelligence research and development team that discovers,
analyzes, monitors, records and alerts on a wide array of computer
security threats and vulnerabilities on an ongoing basis. Let
us help you by providing a snapshot of your organization's data
security vulnerabilities through following one-time or award-winning,
periodic managed services :
Vulnerability testing,
Penetration testing and remediation-
|
Vulnerability
assessment to discover security flaws in the
operating system or application software components.
Penetration
testing for accurate view of your network
security (mimics what a hacker will do to
break into your security).
|
|
|
E-mail security, Anti-Spam,
Anti-Virus, Firewall, Intrusion Detection, Prevention
- |
Assessment
and protection from - Hackers, Spearphishing,
BOTS, SQL Injections, Trojan Horses, Worms,
Ransomware, SPAM, Spyware, Designer Malcode,
Rootkit etc.
|
|
|
Web applications and database
vulnerability assessment and remediation-
|
Testing, assessment
and remediation from common web application
and database security vulnerabilities.
|
|
|
Internal and external
scans of organization's
network devices - |
Full scan
of network devices (scan from external, internal
and trusted locations).
|
|
|
Encryption
to scure your sensitive business data once it’s
on the move - |
Encryption
of Laptop, Removable Device, Blackberry, Email
and Attachment, Backup systems.
|
|
|
Regulatory compliance, audits,
reports and remediation- |
Compliance
with 201 CMR 17.00 - Mass
Privacy and Data Protection Regulation, SOX
- Sarbanes Oxley, GLB - Gramm-Leach-Bliley
Act, HIPAA - Health Insurance
Portability and Accountability Act, SCADA-
Supervisory Control & Data Acquisition
, PCI - Payment Card Industry,
BASEL - Recommendations on
banking laws and regulations issued by the
Basel Committee on Banking Supervision.
|
|
|
Payment Card Industry
compliance testing and remediation -
|
The Payment
Card Industry Data Security Standard (PCI
DSS) applies to every company that processes
credit card information. On January 12, 2006,
Visa announced that it will pay $20 million
in incentives to all acquiring banks
whose merchants achieve PCI
compliance by the end of August. While the
incentives will provide further protection
of cardholder data, they require the merchants
to comply with PCI DSS requirements. Achieving
PCI compliance can be a complex process; and
in the case of many businesses, it requires
a specialized third-party auditor.
Many businesses,
now under the obligation to comply with PCI
standard, remain confused about where to begin.
The stakes are high considering that the credit
card companies and acquirer banks
will take away the ability to process credit
card transactions until the PCI audit is passed.
While many businesses might
appreciate a knowledgeable security advocate
to help them achieve PCI compliance,
merchant Level 1 business are required to
use a Qualified Data Security Company (QDSC)
to complete a Report on Compliance (ROC).
|
|
|
BrickLogix through its partner IBM Internet
Security Systems provides compliance services in the
PCI best practice areas. When working with Merchant Level 1 businesses,
we apply a time-tested process of first finding the security gaps,
applying the necessary remediation, completing and submitting
the report on compliance (ROC) once all the requirements are met.
Throughout the process, as well as the post-submission, we continue
to act as the advocate for the merchant and inform businesses
of tangential data security findings.